Analysis

  • max time kernel
    146s
  • max time network
    62s
  • platform
    windows10_x64
  • resource
    win10v200722
  • submitted
    31-07-2020 09:54

General

  • Target

    6ef057aeccdba2315d58f10941b4ecf0.exe

  • Size

    639KB

  • MD5

    6ef057aeccdba2315d58f10941b4ecf0

  • SHA1

    4aa6f7c5f166ddeb6236d1216542b1431e95de04

  • SHA256

    44577d994806a88cfd4de18af506aab6fe398c12c816ea8d77081574e66b837b

  • SHA512

    825f02042f18c0464d804e196d6518a6e9f6aa2ae215e3ee93947d0daa82c4304640631ffff52af28965b4794ae68e9ba495ee69ec521ea4bf4a36e886cb9dbf

Score
1/10

Malware Config

Signatures

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6ef057aeccdba2315d58f10941b4ecf0.exe
    "C:\Users\Admin\AppData\Local\Temp\6ef057aeccdba2315d58f10941b4ecf0.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:572

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads